Posts

Showing posts from April, 2017

Contaminating Evidence THREE

Parts ONE and TWO can be found here for those who haven't followed the discussion so far: Contaminating Evidence ONE  - http://trewmte.blogspot.co.uk/2017/04/contaminating-evidence-one.html Contaminating Evidence TWO - http://trewmte.blogspot.co.uk/2017/04/contaminating-evidence-two.html I have received enquiries asking for references how to test a damaged SIM card is working or not? This is

Contaminating Evidence TWO

The goal of these essay discussions is to provide responses to the potential proposition that could arise in the theoretical question.  Part One can be found here: http://trewmte.blogspot.co.uk/2017/04/contaminating-evidence-one.html “What would you do if presented with an exhibit bag containing a mobile phone (which cannot be fully accessed without a SIM Card) and a SIM Card (which was not

Contaminating Evidence ONE

The theoretical question highlighted below was originally posted on a forum to provide work material for students. Recently the same question was resurrected again by a student seeking a response to the question for a test paper? “What would you do if presented with an exhibit bag containing a mobile phone (which cannot be fully accessed without a SIM Card) and a SIM Card (which was not

Cyber-teaching: bite-size learning No:5

Advanced Threat Analytics (ATA) may sound quite off-putting if your organisation is a small-to-medium sized enterprise (SME). What does ATA do? Microsoft latest playbook (2017) creates a simulation learning environment where IT administrators for servers and computers can train and gain experience in searching for clues where attack (infiltration) to a network/s has occurred. Take it that it

Digital Evidence ISO/IEC 27037 -v- ISO/IEC 17025

Could ISO/IEC 27037:2012 be the better option for handling and obtaining digital forensic evidence? ISO/IEC 27037:2012-10 (E)Information technology - Security techniques - Guidelines for identification,collection, acquisition and preservation of digital evidence ContentsForeword ..................................................................................................................

Crime: Base Station Monitoring and Regular Stress Tests

Photo courtesy of the Macau Post Daily News feed: https://www.macaupostdaily.com/article2451.html There is no shortage of police investigations, articles and reports into cellular technology being used for some sort of illegal purposes, and that is beyond the normal seizure of mobile devices in criminal proceedings. The recent prosecution of a construction worker, reported (10-03-2017) in

Monolith Recovery

Wow! The future of handling chip off exploration looks great with this new innovation tool to get at content in Flash memory microchips: UFD (USB Flash Drive) SD (Secure Digital Card) CF (Compact Flash) micro SD (micro Secure Digital Card) MS (Memory Stick) xD Monolithic Flash Devices MMC (Multi Media Card) eMMC (embedded Multi Media Card) VoiceRecorder (dictaphone) iPhone (without hardware